IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

Web Access Control

RSS Feed    Add to Google    Add to My Yahoo!
Web Access Control Reports
 
Strong Authentication: Securing Identities and Enabling Productivity
sponsored by SafeNet, Inc.
WHITE PAPER: Access this informative white paper to learn how strong authentication methods like USB tokens and smart cards are helping organizations to stay ahead of the security curve.
Posted: 20 Aug 2015 | Published: 20 Aug 2015

SafeNet, Inc.

IAM and Authentication Trends in 2015
sponsored by SafeNet, Inc.
WEBCAST: This webcast takes into consideration the forces of the cloud, mobility, and user identity, and the way these forces are impacting IAM. The complex challenges created by these trends and what steps can be taken to overcome them are discussed.
Posted: 20 Aug 2015 | Premiered: Mar 24, 2015

SafeNet, Inc.

The Security Challenges of Digital Collaboration
sponsored by Varonis
WHITE PAPER: This white paper discusses the problem of universal access to sensitive data and gives suggestions for solving this problem without interfering with the business process.
Posted: 24 Jun 2015 | Published: 24 Jun 2015

Varonis

IAM: Delivering Secure, New Business Services in a Multi-Channel Customer Environment
sponsored by CA Technologies.
WHITE PAPER: This white paper explores 13 requirements to leverage multi-channel IAM to convert customers and protect their sensitive data.
Posted: 11 Jun 2015 | Published: 04 Dec 2014

CA Technologies.

The Top B2E Cloud IAM Vendors Revealed
sponsored by Okta
WHITE PAPER: This white paper rates and ranks the top B2E cloud vendors and platforms to simplify your search. Access this helpful resource now to learn the strengths and weaknesses of each offering and the key components to look for when making your decision.
Posted: 25 Aug 2015 | Published: 29 Jun 2015

Okta

See clearly in the cloud with threat-aware identity and access management
sponsored by IBM
WHITE PAPER: View this white paper to learn how next-generation cloud security technologies can securely connect people, applications, and devices to cloud environments, eliminating data and application protection concerns.
Posted: 21 Mar 2015 | Published: 31 Oct 2014

IBM

Battle the Evolving Threat Landscape with Dynamic Authentication Strategies
sponsored by SecureAuth
WHITE PAPER: This resource highlights the vital need for dynamic authentication, especially to increase the effectiveness by reducing false positives and false negatives.
Posted: 24 Oct 2014 | Published: 24 Oct 2014

SecureAuth

Device Fingerprinting: A New Tool for Enhanced Application Protection
sponsored by Radware
WHITE PAPER: Access this white paper to learn the five common factors challenging IP-based identification and how device fingerprinting can make it easier.
Posted: 10 Jul 2015 | Published: 29 May 2015

Radware

Device Fingerprinting – Low-Friction, BYOD Authentication
sponsored by SecureAuth
WHITE PAPER: This white paper introduces SecureAuth's Device Fingerprinting, which features the flexibility, security, and convenience required to increase layers of authentication without creating high friction for users.
Posted: 20 Oct 2014 | Published: 16 Mar 2015

SecureAuth

From Project to Product
sponsored by Red Hat
WHITE PAPER: Software developed by an open source community with testing, certification, documentation, training and support can help IT organizations experience lower middleware with total cost of ownership and risk. Read this white paper to learn about the benefits of open source technology.
Posted: 03 Aug 2015 | Published: 31 Dec 2014

Red Hat
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement